Asiacrypt

Results: 43



#Item
31A shortened version of this paper appears under the same title in the proceedings of Asiacrypt[removed]Xuejia Lai, ed.), LNCS, Springer-Verlag. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition? So

A shortened version of this paper appears under the same title in the proceedings of Asiacrypt[removed]Xuejia Lai, ed.), LNCS, Springer-Verlag. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition? So

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-15 14:18:24
32Scalable Group Signature with Revocation Benoit Libert1 , Thomas Peters1 , Moti Yung2 1 - Universit´ e catholique de Louvain, Crypto Group (Belgium) 2 - Columbia University and Google Inc. (USA)

Scalable Group Signature with Revocation Benoit Libert1 , Thomas Peters1 , Moti Yung2 1 - Universit´ e catholique de Louvain, Crypto Group (Belgium) 2 - Columbia University and Google Inc. (USA)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:21
33Full version of an extended abstract published in Proceedings of Asiacrypt 2010, Springer-Verlag, 2010. Available from the IACR Cryptology ePrint Archive as Report[removed]Limitations on Transformations from Composite-

Full version of an extended abstract published in Proceedings of Asiacrypt 2010, Springer-Verlag, 2010. Available from the IACR Cryptology ePrint Archive as Report[removed]Limitations on Transformations from Composite-

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:47:28
34IACR Guidelines for General Chairs September 2014∗ Dear General Chair, The purpose of this document is to help you smoothly run a successful conference or workshop, and help in managing the IACR finances and membership

IACR Guidelines for General Chairs September 2014∗ Dear General Chair, The purpose of this document is to help you smoothly run a successful conference or workshop, and help in managing the IACR finances and membership

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2014-09-22 14:38:17
35IACR Rules and Guidelines for Steering Committees September 2010∗ 1  Introduction

IACR Rules and Guidelines for Steering Committees September 2010∗ 1 Introduction

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2011-05-24 09:41:32
36IACR Guidelines for Program Chairs September 2014∗ Dear Program Chair(s), The purpose of this document is to help you run a successful conference or workshop program. For the most part it consists of guidelines that ar

IACR Guidelines for Program Chairs September 2014∗ Dear Program Chair(s), The purpose of this document is to help you run a successful conference or workshop program. For the most part it consists of guidelines that ar

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2014-09-22 14:38:17
37Vinod Vaikuntanathan Curriculum Vitae Date of Revision:May 2, 2013 A BIOGRAPHICAL INFORMATION A.1

Vinod Vaikuntanathan Curriculum Vitae Date of Revision:May 2, 2013 A BIOGRAPHICAL INFORMATION A.1

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-05-02 00:24:31
38Updating the IACR Publication Infrastructure by a Preprint Server Eli Biham Computer Science Department Technion – Israel Institute of Technology Haifa 32000, Israel

Updating the IACR Publication Infrastructure by a Preprint Server Eli Biham Computer Science Department Technion – Israel Institute of Technology Haifa 32000, Israel

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 1999-08-30 11:43:26
39Curriculum Vitae ALLISON BISHOP LEWKO Office Address: Department of Computer Science Columbia University

Curriculum Vitae ALLISON BISHOP LEWKO Office Address: Department of Computer Science Columbia University

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2014-06-06 00:27:47
40Concurrently Secure Identification Schemes based on the Worst-Case Hardness of Lattice Problems ASIACRYPT 2008 Dec. 10

Concurrently Secure Identification Schemes based on the Worst-Case Hardness of Lattice Problems ASIACRYPT 2008 Dec. 10

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2010-01-23 11:51:04